default search action
Proceedings of the ACM on Software Engineering, Volume 1
Volume 1, Number FSE, 2024
SIGSOFT FSE 2024
- Xiangping Chen, Furen Xu, Yuan Huang, Neng Zhang, Zibin Zheng:
JIT-Smart: A Multi-task Learning Framework for Just-in-Time Defect Prediction and Localization. 1-23 - Guangba Yu, Pengfei Chen, Zilong He, Qiuyu Yan, Yu Luo, Fangyuan Li, Zibin Zheng:
ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems. 24-46 - Zirui Song, Jiongyi Chen, Kehuan Zhang:
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-Specific Code Embeddings. 47-69 - Keke Lian, Lei Zhang, Guangliang Yang, Shuo Mao, Xinjie Wang, Yuan Zhang, Min Yang:
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications. 70-91 - Mohayeminul Islam, Ajay Kumar Jha, Ildar Akhmetov, Sarah Nadi:
Characterizing Python Library Migrations. 92-114 - Yifan Zhang, Jiliang Li, Zachary Karas, Aakash Bansal, Toby Jia-Jun Li, Collin McMillan, Kevin Leach, Yu Huang:
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization. 115-136 - Zhihan Jiang, Jinyang Liu, Zhuangbin Chen, Yichen Li, Junjie Huang, Yintong Huo, Pinjia He, Jiazhen Gu, Michael R. Lyu:
LILAC: Log Parsing using LLMs with Adaptive Parsing Cache. 137-160 - Zexu Wang, Jiachi Chen, Yanlin Wang, Yu Zhang, Weizhe Zhang, Zibin Zheng:
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts. 161-181 - Bolun Li, Zhihong Sun, Tao Huang, Hongyu Zhang, Yao Wan, Ge Li, Zhi Jin, Chen Lyu:
IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion. 182-203 - Liming Nie, Yangyang Zhao, Chenglin Li, Xuqiong Luo, Yang Liu:
Shadows in the Interface: A Comprehensive Study on Dark Patterns. 204-225 - Yahui Song, Xiang Gao, Wenhua Li, Wei-Ngan Chin, Abhik Roychoudhury:
ProveNFix: Temporal Property-Guided Program Repair. 226-248 - Zeqin Liao, Yuhong Nan, Henglong Liang, Sicheng Hao, Juan Zhai, Jiajing Wu, Zibin Zheng:
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis. 249-270 - Aashish Yadavally, Yi Li, Tien N. Nguyen:
Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence Learning. 271-292 - Yoel Kim, Yunja Choi:
PBE-Based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software. 293-315 - Tae Eun Kim, Jaeseung Choi, Seongjae Im, Kihong Heo, Sang Kil Cha:
Evaluating Directed Fuzzers: Are We Heading in the Right Direction? 316-337 - Islem Bouzenia, Bajaj Piyush Krishan, Michael Pradel:
DyPyBench: A Benchmark of Executable Python Software. 338-358 - Jingzhi Gong, Tao Chen:
Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning. 359-382 - Haeun Eom, Dohee Kim, Sori Lim, Hyungjoon Koo, Sungjae Hwang:
R2I: A Relative Readability Metric for Decompiled Code. 383-405 - Daoguang Zan, Ailun Yu, Bo Shen, Bei Chen, Wei Li, Yongshun Gong, Xiaolin Chen, Yafen Yao, Weihua Luo, Bei Guan, Yan Liu, Yongji Wang, Qianxiang Wang, Lizhen Cui:
DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises. 406-426 - Necip Fazil Yildiran, Jeho Oh, Julia Lawall, Paul Gazzillo:
Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times. 427-449 - Agustín Nolasco, Facundo Molina, Renzo Degiovanni, Alessandra Gorla, Diego Garbervetsky, Mike Papadakis, Sebastián Uchitel, Nazareno Aguirre, Marcelo F. Frias:
Abstraction-Aware Inference of Metamorphic Relations. 450-472 - Haiyu Huang, Xiaoyu Zhang, Pengfei Chen, Zilong He, Zhiming Chen, Guangba Yu, Hongyang Chen, Chen Sun:
TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime State. 473-493 - Xiao Cheng, Jiawei Ren, Yulei Sui:
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point Slicing. 494-516 - Anderson Oliveira, João Lucas Correia, Wesley K. G. Assunção, Juliana Alves Pereira, Rafael Maiani de Mello, Daniel Coutinho, Caio Barbosa, Paulo Vítor C. F. Libório, Alessandro Garcia:
Understanding Developers' Discussions and Perceptions on Non-functional Requirements: The Case of the Spring Ecosystem. 517-538 - Tao Chen, Miqing Li:
Adapting Multi-objectivized Software Configuration Tuning. 539-561 - Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. 562-585 - Yan Wang, Xiaoning Li, Tien N. Nguyen, Shaohua Wang, Chao Ni, Ling Ding:
Natural Is the Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models. 586-608 - Yichen Li, Yintong Huo, Renyi Zhong, Zhihan Jiang, Jinyang Liu, Junjie Huang, Jiazhen Gu, Pinjia He, Michael R. Lyu:
Go Static: Contextualized Logging Statement Generation. 609-630 - Malinda Dilhara, Abhiram Bellur, Timofey Bryksin, Danny Dig:
Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example. 631-653 - Sourav Deb, Kush Jain, Rijnard van Tonder, Claire Le Goues, Alex Groce:
Syntax Is All You Need: A Universal-Language Approach to Mutant Generation. 654-674 - Ramakrishna Bairi, Atharv Sonwane, Aditya Kanade, Vageesh D. C., Arun Iyer, Suresh Parthasarathy, Sriram K. Rajamani, Balasubramanyan Ashok, Shashank Shet:
CodePlan: Repository-Level Coding using LLMs and Planning. 675-698 - Wei Wang, Huilong Ning, Gaowei Zhang, Libo Liu, Yi Wang:
Rocks Coding, Not Development: A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks. 699-721 - Huaien Zhang, Yu Pei, Shuyun Liang, Shin Hwei Tan:
Understanding and Detecting Annotation-Induced Faults of Static Analyzers. 722-744 - Jiawei Li, David Faragó, Christian Petrov, Iftekhar Ahmed:
Only diff Is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language Model. 745-766 - Sabaat Haroon, Chris Brown, Muhammad Ali Gulzar:
DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing. 767-788 - Nalin Wadhwa, Jui Pradhan, Atharv Sonwane, Surya Prakash Sahu, Nagarajan Natarajan, Aditya Kanade, Suresh Parthasarathy, Sriram K. Rajamani:
CORE: Resolving Code Quality Issues using LLMs. 789-811 - Md Rakib Hossain Misu, Cristina V. Lopes, Iris Ma, James Noble:
Towards AI-Assisted Synthesis of Verified Dafny Methods. 812-835 - Mehdi Keshani, Tudor-Gabriel Velican, Gideon Bot, Sebastian Proksch:
AROMA: Automatic Reproduction of Maven Artifacts. 836-858 - Hai Duong, Dong Xu, ThanhVu Nguyen, Matthew B. Dwyer:
Harnessing Neuron Stability to Improve DNN Verification. 859-881 - Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk:
"The Law Doesn't Work Like a Computer": Exploring Software Licensing Issues Faced by Legal Practitioners. 882-905 - Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings. 906-928 - Christian Birchler, Tanzil Kombarabettu Mohammed, Pooja Rani, Teodora Nechita, Timo Kehrer, Sebastiano Panichella:
How Does Simulation-Based Testing for Self-Driving Cars Match Human Perception? 929-950 - Gabriel Ryan, Siddhartha Jain, Mingyue Shang, Shiqi Wang, Xiaofei Ma, Murali Krishna Ramanathan, Baishakhi Ray:
Code-Aware Prompting: A Study of Coverage-Guided Test Generation in Regression Setting using LLM. 951-971 - Yanfu Yan, Nathan Cooper, Kevin Moran, Gabriele Bavota, Denys Poshyvanyk, Steve Rich:
Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs. 972-995 - Gengyi Sun, Sarra Habchi, Shane McIntosh:
RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction. 996-1018 - Luwei Cai, Fu Song, Taolue Chen:
Towards Efficient Verification of Constant-Time Cryptographic Implementations. 1019-1042 - Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto:
Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions. 1043-1065 - Vijayaraghavan Murali, Chandra Shekhar Maddila, Imad Ahmad, Michael Bolin, Daniel Cheng, Negar Ghorbani, Renuka Fernandez, Nachiappan Nagappan, Peter C. Rigby:
AI-Assisted Code Authoring at Scale: Fine-Tuning, Deploying, and Mixed Methods Evaluation. 1066-1085 - Oussama Ben Sghaier, Houari A. Sahraoui:
Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge Distillation. 1086-1106 - Zejun Zhang, Zhenchang Xing, Xiaoxue Ren, Qinghua Lu, Xiwei Xu:
Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models. 1107-1128 - Zhiqiang Zang, Fu-Yao Yu, Aditya Thimmaiah, August Shi, Milos Gligoric:
Java JIT Testing with Template Extraction. 1129-1151 - Hsin-Wei Hung, Ardalan Amiri Sani:
BRF: Fuzzing the eBPF Runtime. 1152-1171 - Hongyi Lu, Zhibo Liu, Shuai Wang, Fengwei Zhang:
DTD: Comprehensive and Scalable Testing for Debuggers. 1172-1193 - Simin Chen, Xiaoning Feng, Xiaohong Han, Cong Liu, Wei Yang:
PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models. 1194-1215 - Yichen Li, Dongwei Xiao, Zhibo Liu, Qi Pang, Shuai Wang:
Metamorphic Testing of Secure Multi-party Computation (MPC) Compilers. 1216-1237 - Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich, Kelly Blincoe:
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications. 1238-1261 - Anita Sarma, Nina Chen:
Effective Teaching through Code Reviews: Patterns and Anti-patterns. 1262-1283 - Shaokang Jiang, Michael Coblenz:
An Analysis of the Costs and Benefits of Autocomplete in IDEs. 1284-1306 - Dirk Beyer, Matthias Kettl, Thomas Lemberger:
Decomposing Software Verification using Distributed Summary Synthesis. 1307-1329 - Jenny T. Liang, Carmen Badea, Christian Bird, Robert DeLine, Denae Ford, Nicole Forsgren, Thomas Zimmermann:
Can GPT-4 Replicate Empirical Software Engineering Research? 1330-1353 - Max Landauer, Florian Skopik, Markus Wurzenberger:
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-Based Anomaly Detection Techniques. 1354-1375 - Xin Jin, Zhiqiang Lin:
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach. 1376-1399 - Jesse Chen, Dharun Anandayuvaraj, James C. Davis, Sazzadur Rahaman:
On the Contents and Utility of IoT Cybersecurity Guidelines. 1400-1423 - Sungmin Kang, Gabin An, Shin Yoo:
A Quantitative and Qualitative Evaluation of LLM-Based Explainable Fault Localization. 1424-1446 - Kaixuan Li, Yue Xue, Sen Chen, Han Liu, Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen:
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? 1447-1470 - Soneya Binta Hossain, Nan Jiang, Qiang Zhou, Xiaopeng Li, Wen-Hao Chiang, Yingjun Lyu, Hoan Anh Nguyen, Omer Tripp:
A Deep Dive into Large Language Models for Automated Bug Localization and Repair. 1471-1493 - Jun Lyu, Shanshan Li, He Zhang, Lanxin Yang, Bohan Liu, Manuel Rigger:
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations. 1494-1517 - Ophir M. Carmel, Guy Katz:
On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software. 1518-1539 - Shengcheng Yu, Chunrong Fang, Quanjun Zhang, Mingzhe Du, Jia Liu, Zhenyu Chen:
Semi-supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules. 1540-1563 - Shihan Dou, Yueming Wu, Haoxiang Jia, Yuhao Zhou, Yan Liu, Yang Liu:
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection. 1564-1584 - Zhen Yang, Fang Liu, Zhongxing Yu, Jacky Wai Keung, Jia Li, Shuo Liu, Yifan Hong, Xiaoxue Ma, Zhi Jin, Ge Li:
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation. 1585-1608 - Changwei Zou, Dongjie He, Yulei Sui, Jingling Xue:
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers. 1609-1631 - Md Shamimur Rahman, Zadia Codabux, Chanchal K. Roy:
Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion. 1632-1655 - Weigang He, Peng Di, Mengli Ming, Chengyu Zhang, Ting Su, Shijie Li, Yulei Sui:
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles. 1656-1678 - Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning. 1679-1702 - Zhiqiang Yuan, Mingwei Liu, Shiji Ding, Kaixin Wang, Yixuan Chen, Xin Peng, Yiling Lou:
Evaluating and Improving ChatGPT for Unit Test Generation. 1703-1726 - Xin Tan, Yan Gong, Geyu Huang, Haohua Wu, Li Zhang:
How to Gain Commit Rights in Modern Top Open Source Communities? 1727-1749 - Yibo He, Jiaming Huang, Hao Yu, Tao Xie:
An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation. 1750-1771 - Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long:
Demystifying Invariant Effectiveness for Securing Smart Contracts. 1772-1795 - Haoran Liu, Zhouyang Jia, Shanshan Li, Yan Lei, Yue Yu, Yu Jiang, Xiaoguang Mao, Xiangke Liao:
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs. 1796-1818 - Ranim Khojah, Mazen Mohamad, Philipp Leitner, Francisco Gomes de Oliveira Neto:
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice. 1819-1840 - Yi Qin, Yanxiang Tong, Yifei Xu, Chun Cao, Xiaoxing Ma:
Active Monitoring Mechanism for Control-Based Self-Adaptive Systems. 1841-1864 - Md. Mahadi Hassan, John Salvador, Shubhra Kanti Karmaker Santu, Akond Rahman:
State Reconciliation Defects in Infrastructure as Code. 1865-1888 - Madeline Endres, Sarah Fakhoury, Saikat Chakraborty, Shuvendu K. Lahiri:
Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions? 1889-1912 - Yuntianyi Chen, Yuqi Huai, Shilong Li, Changnam Hong, Joshua Garcia:
Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems. 1913-1936 - Md Nakhla Rafi, Dong Jae Kim, An Ran Chen, Tse-Hsun (Peter) Chen, Shaowei Wang:
Towards Better Graph Neural Network-Based Fault Localization through Enhanced Code Representation. 1937-1959 - Giovanni Denaro, Noura El Moussa, Rahim Heydarov, Francesco Lomio, Mauro Pezzè, Ketai Qiu:
Predicting Failures of Autoscaling Distributed Applications. 1960-1981 - Tarek Alakmeh, David R. Reich, Lena A. Jäger, Thomas Fritz:
Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code using Deep Neural Networks. 1982-2004 - Jinyin Chen, Chengyu Jia, Yunjie Yan, Jie Ge, Haibin Zheng, Yao Cheng:
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators. 2005-2027 - Dirk Beyer, Po-Chun Chien, Marek Jankola, Nian-Ze Lee:
A Transferability Study of Interpolation-Based Hardware Model Checking for Software Verification. 2028-2050 - David Broneske, Sebastian Kittan, Jacob Krüger:
Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations. 2051-2074 - Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. 2075-2097 - Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogSD: Detecting Anomalies from System Logs through Self-Supervised Learning and Frequency-Based Masking. 2098-2120 - Ying Xiao, Jie M. Zhang, Yepang Liu, Mohammad Reza Mousavi, Sicen Liu, Dingyuan Xue:
MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions. 2121-2143 - Matteo Paltenghi, Michael Pradel:
Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit. 2144-2166 - Shuqing Li, Cuiyun Gao, Jianping Zhang, Yujia Zhang, Yepang Liu, Jiazhen Gu, Yun Peng, Michael R. Lyu:
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Apps. 2167-2189 - Haoran Yang, Yu Nong, Tao Zhang, Xiapu Luo, Haipeng Cai:
Learning to Detect and Localize Multilingual Bugs. 2190-2213 - Luan Pham, Huong Ha, Hongyu Zhang:
BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection. 2214-2237 - Doriane Olewicki, Sarra Habchi, Bram Adams:
An Empirical Study on Code Review Activity Prediction and Its Impact in Practice. 2238-2260 - Bonan Kou, Shengmai Chen, Zhijie Wang, Lei Ma, Tianyi Zhang:
Do Large Language Models Pay Similar Attention Like Human Programmers When Generating Code? 2261-2284 - Shasha Zhou, Mingyu Huang, Yanan Sun, Ke Li:
Evolutionary Multi-objective Optimization for Contextual Adversarial Example Generation. 2285-2308 - Khouloud Oueslati, Gabriel Laberge, Maxime Lamothe, Foutse Khomh:
Mining Action Rules for Defect Reduction Planning. 2309-2331 - Fangwen Mu, Lin Shi, Song Wang, Zhuohao Yu, Binquan Zhang, Chenxue Wang, Shichao Liu, Qing Wang:
ClarifyGPT: A Framework for Enhancing LLM-Based Code Generation via Requirements Clarification. 2332-2354 - Yubo Mai, Zhipeng Gao, Xing Hu, Lingfeng Bao, Yu Liu, Jianling Sun:
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-Context Learning. 2355-2377 - Farbod Farhour, Ahmad Abdellatif, Essam Mansour, Emad Shihab:
A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories. 2378-2401 - Cleidson R. B. de Souza, Emilie Ma, Jesse Wong, Dongwook Yoon, Ivan Beschastnikh:
Revealing Software Development Work Patterns with PR-Issue Graph Topologies. 2402-2423 - Simin Chen, Zexin Li, Wei Yang, Cong Liu:
DeciX: Explain Deep Learning Based Code Generation Applications. 2424-2446 - Jaehan Yoon, Sooyoung Cha:
FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution. 2447-2468 - Chengpeng Wang, Jipeng Zhang, Rongxin Wu, Charles Zhang:
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization. 2469-2492 - Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang:
Partial Solution Based Constraint Solving Cache in Symbolic Execution. 2493-2514 - Yizhan Huang, Yichen Li, Weibin Wu, Jianping Zhang, Michael R. Lyu:
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-Coded Credentials. 2515-2537 - Neil Walkinshaw, Michael Foster, José Miguel Rojas, Robert M. Hierons:
Bounding Random Test Set Size with Computational Learning Theory. 2538-2560 - Xiaoyan Zhu, Mingyue Jiang, Xiao-Yi Zhang, Liming Nie, Zuohua Ding:
MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems. 2561-2583 - Georgios-Petros Drosos, Thodoris Sotiropoulos, Diomidis Spinellis, Dimitris Mitropoulos:
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis. 2584-2607 - Kai Gao, Weiwei Xu, Wenhao Yang, Minghui Zhou:
PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages. 2608-2631 - Nimmi Rashinika Weeraddana, Mahmoud Alfadel, Shane McIntosh:
Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the npm Ecosystem. 2632-2655 - Zhaoxu Zhang, Fazle Mohammed Tawsif, Komei Ryu, Tingting Yu, William G. J. Halfond:
Mobile Bug Report Reproduction via Global Search on the App UI Model. 2656-2676 - Yaoxuan Wu, Ahmad Humayun, Muhammad Ali Gulzar, Miryung Kim:
Natural Symbolic Execution-Based Testing for Big Data Analytics. 2677-2700 - Chuan Yan, Mark Huasong Meng, Fuman Xie, Guangdong Bai:
Investigating Documented Privacy Changes in Android OS. 2701-2724 - Qilin Zhou, Zhengyuan Wei, Haipeng Wang, Bo Jiang, Wing-Kwong Chan:
CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models. 2725-2746 - Qi Xin, Haojun Wu, Jinran Tang, Xinyu Liu, Steven P. Reiss, Jifeng Xuan:
Detecting, Creating, Repairing, and Understanding Indivisible Multi-Hunk Bugs. 2747-2770
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.